this post was submitted on 11 Nov 2024
807 points (97.6% liked)
Technology
59495 readers
3081 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Research conducted by the Mozilla Foundation indicates that the app referred to in the article, Clue, gathers extensive information and shares certain data with third parties for advertising, marketing, and research reasons.
Here are some menstruation tracking apps that are open-source and prioritize user privacy by keeping your data stored locally on your device:
The only way to protect data is to not gather it.
Having your own data can be incredibly useful and valuable, the trick is protecting that data so that nefarious actors can't use it.
Sure, but tracking period data can be very helpful for people. For a threat model of abortion criminalisation (or maybe trans healthcare criminalisation with treatments stopping periods, or really any kind of restrictions on medical autonomy), encryption at rest of locally stored period data is perfectly sufficient. They are not going to send military intelligence agencies after a random person having an abortion. It is actually a relatively low threat model, like equivalent to buying drugs online or something like that.
I mostly mean having data stored in a centralized database owned by a corporation. Since even if it’s encrypted you’re just one warrant away from the data being handed over.
If only the user has the key then there's no real concern with the data being handed over
False